It is not uncommon that every system administrator has a copy of system maintenance tasks checklist. Although, not every system administrator will follow.
As a competent system administrator, he or she, should aware few of these system administration baseline
- Implement/revise backup strategy and conduct backup-data restoration test on a regularly basis.There is no points to have system backup in place, if no one is able to confirm that the backup strategy is works as it said. For example, some data or files might have been left out from backup strategy after a system upgrade, or the backup media becomes faulty over the time, etc.
- Discuss with system owners and key personnel about their business needs, from time to time, in order to come up with a disaster recovery strategy that is really works, or meets the business requirement that change rapidly!
- Be alert and pay attention to any warning signs.The purpose of warning is to alert system administrators, about the potential of developing critical errors in later stage. Although, not every warning sign is significant. For example, a server that suddenly reboots recently, intermittent network connection problems, etc.
- Serious about system documentation!No one could really remember every minor system parameter change. Without complete system change records, it is hard to recover a failed system to full operational state before system crash. It is not efficient to troubleshoot system failure that might only arise after few of the minor changes.
- Adopt the philosophy of “Everything that can be logged should be logged.“.Disk space is relatively cheaper than before, while the hard disk capacity is getting bigger and bigger. So, it is not wise to turn off system or application logging! Without sufficient logging information, system administrators will likely take longer time to troubleshoot a system failure!
- Take time to evaluate patches released by respective system vendors, and apply the patches as soon as possible if applicable. Ignore or delay applying patches might end up a painful system administration life, when the system crash or get attack.
- Enforce rigid password policy, such alphanumeric password, secondary authentication (such as time token) to complement password, educate system users the importance of keeping password securely to themselves, etc.